"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide."
The above description is the profile of the average computer-virus writer, according to Jan Hruska, the chief executive of British-based Sophos PLC, the world's fourth-largest anti-virus solutions provider.
"They have a chronic lack of girlfriends, are usually socially inadequate and are drawn compulsively to write self- replicating codes. It's a form of digital graffiti to them," Hruska added.
To create and spread cyber infections, virus writers explore known bugs in existing software, or look for vulnerabilities in new versions.
With more and more new OS (operating system) versions, there will be more new forms of viruses, as every single software or OS will carry new features, and new executables that can be carriers of the infection.
Executables are files that launch applications in a computer's operating system, and feature more prominently in new platforms like Microsoft's Windows 2000 and Windows XP than they did in the older DOS or Windows 3.1.
Virus writers also share information to create variants of the same infection, such as the Klez worm, which has been among the world's most prolific viruses.
The Klez, a mass-mailing worm that originated in November 2001, propagates via e-mail using a wide variety of messages and destroys files on local and network drives.
But the news gets worse. Recent events have uncovered what may be a new trend: spammers paying virus writers to create worms that plant an open proxy, which the spammer then can use to forward spam automatically. Many suspect this occurred with the SoBig virus.
The Sobig worms, began spreading in the early part of 2003. The unusual thing about them was they contained an expiration date and were given a short life cycle to see how features worked in the wild.
Having an expiration date also makes the virus more dangerous, because most people would have been alerted to the new worm within a few weeks and anti-virus definitions would have been updated.
A variant of Sobig, Sobig-F was so efficient that just a few infected machines could send thousands of messages. Sobig-F created a denial-of-service effect on some networks, as e- mail servers became clogged with copies of the worm.
According to Mikko Hypponen, manager of anti-virus research for Finland-based F-Secure Corp, Sobig-F sent an estimated 300 million copies of itself.
Computer Economics, Inc. states, "Nearly 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage." However criminal prosecutions have been few, penalties light and just a handful of people have gone to prison for spreading the destructive bugs.
Why is so little being done? Antiquated laws and, for many years, as crazy as it sounds, a "wink, wink" or even admiring attitude toward virus creators.
One person has been sent to prison in the United States and just two in Britain, authorities say. But the low numbers are "not reflective of how seriously we take these cases, but more reflective of the fact that these are very hard cases to prosecute," said Chris Painter, the deputy chief of computer crimes at the U.S. Department of Justice.
So what can you do to protect yourself against computer viruses?
Well, first and foremost, make sure you have proven anti-virus protection like like Symantec's Norton Anti-Virus or McAfee's ViruScan.
In addition, If you haven't already done so, I highly recommend installing Microsoft's Service Pack 2. SP2 tightens your PC's security with a new Windows Firewall, an improved Automatic Updates feature, and a pop-up ad blocker for Internet Explorer. Plus, the newly minted Security Center gives you one easy-to-use interface for keeping tabs on your PC's security apps.
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide."
Now, I'm no psychiatrist, but to me, the above description sounds more like someone with a few "bats in the belfry!"
About The Author
Dean Phillips is an Internet marketing expert, writer, publisher and entrepreneur. Questions? Comments? Dean can be reached at mailto: dean@lets-make-money.net
Visit his website at: http://www.lets-make-money.net
Have you seen the web site, www.freestuff.com? Or have you... Read More
First off I should explain what phishing is. Phishing is... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Since its birth, the Internet has grown and expanded to... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Identity theft is one of the most common criminal acts... Read More
In recent days, I was one of the unfortunate persons... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
You've seen it in the news - 40 million credit... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
First of all we need to get some terms stated.... Read More
When the Internet first came about, it was realized it... Read More
Security leaks can be a big problem for any site... Read More
If spyware were a person and he set himself up... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Is your data secure? Think again. Securing data is unlike... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
You can detect spyware online using free spyware cleaners and... Read More
Watching how the traditional media covers the latest virus or... Read More
Shopping for horse gifts or other gift items on the... Read More
File sharing on p2p is soaring despite the music and... Read More
There are several basic concepts to keep in mind when... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Over the past few years as the internet has become... Read More
If you are wondering how to fight spyware for safe... Read More
Credit card fraud is a growing problem for online businesses... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Many of us have run into an annoying and time-consuming... Read More
A new variation of the Nigerian Scam theme ... Read More
Computer infections can be broken up into 4 main categories... Read More
Today,on most internet user's computers, we have the ability to... Read More
Millions of people make purchases online, but many people are... Read More
First I would like to stress I am condoning the... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
I got a virus the other day, Thursday I believe... Read More
Business on the internet is getting down right shameless. This... Read More
This is the second in a series of articles highlighting... Read More
Well, this is an article I never thought I would... Read More
Computer security for most can be described in 2 words,... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
In the past I've never really paid much attention to... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
You and I are a lot alike. We are both... Read More
In today's times spyware is a very serious issue and... Read More
A few nights ago I received an email from "2CO"... Read More
When we think of adware, what comes to mind are... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Did you know...? 1 in 5 children who use computer... Read More
You may not realize it, but as you are surfing... Read More
If you run any type of Internet business, Adware and... Read More
Every single time you access a website, you leave tracks.... Read More
When it comes to a secure website and passwords it... Read More
The top five online scams on the Internet hit nearly... Read More
Every now and then you can read about a new... Read More
If you are a parent, as am I, I think... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Only the top spyware removers are successful at detecting and... Read More
Spyware is software or hardware installed on a computer without... Read More
You'd better learn news from media, not from emails, security... Read More
When it comes to reporting Internet scams most of us... Read More
Internet Security |